The role security plays in protecting Papa John’s International assets The security personnel ought to be able to handle many responsibilities and fill various roles as required. Frequently this may occur while protecting the assets of an organization, in addition to the welfare and health of the employees of the organization. These responsibilities and roles vary, according to the kind of facility or the circumstances that the security officers may find themselves in. This paper will discuss the role security plays in protecting an organization’s assets in reference to Papa John’s, International, based on David Rydeen’s interview; the national director of safety and security at Papa John’s, International. In addition, it will explain existing security measures as regards the customers, employees and the organization itself. Secondly, the paper will try to envisage security problems faced by Papa John’s International. Further, it will attempt to explain forms of control procedures presently in place, as well as, the security director’s diverse professional responsibilities (including loss prevention, investigation, and managerial and administrative functions) and the critical skills required by him to succeed.
Finally, there will be illustrations of ethical dilemmas that Papa John’s face, when controlling mechanisms put in place and also the importance of internal and external relationships to the fulfillment of the security department’s mission. The broad spectrum of activities in which security operatives involve themselves to protect an organization’s assets will also be discussed. Papa John’s, International, (also known as “PJ’s”) has adamantly assures their customers, company, and the whole organization’s security. They have put into action, a sense of ethical values and high morals within their system of security. First and foremost, let’s talk about the current measures of security in place. At Papa John’s, they have a Code of Ethics which assists in keeping the security of their company and their customers. In it, they mention the conflicts of interest and ways to shun them. They mention that, given that, their daily record books are kept current, in addition to, keeping them precise security breaches are likely to be minimal.
Question 1: Identify 4 (four) different competences of Papa John International and justify your selection of these competences by indicating the type of competences that each of them is. The first and most important core competency of Papa John’s is their emphasis on providing a superior quality traditional pizza. This core competency has been the foundation of their success and it has helped them ...
Besides, they affirm that within their Code the company and the team members contribute to the interest of keeping away any insider-trading prosecution or investigation, for the reason that, the potential for substantial criminal civil penalties and the reputation cost are high (Papa John’s, 2011).
Finally, every member has accountability to report any infringements as stipulated in their Code, in any case that may be against their own Policies and Procedures or even against the federal laws. Based on an interview by David Rydeen he states that, his role is to ensure the security and safety of the organization’s team members. He also states that he spends much of his time proactively placing security equipment in various locations, as well as, training the implemented processes in the restaurants. He laments that he is concerned with Papa John’s security, so as not to avoid unwarranted security burdens (Lpportal.com).
In the interview he also mentions that, Papa John’s has a screening test for anybody who wants to be employed by the company, whether it someone working inside the store, or even a delivery driver. Unfortunately, given that all the security procedures are put in place, appalling things may still occur.
Papa John’s provides a service of preparing and distributing pizzas, and cash transfer is involved. Incidences of the delivery drivers and customers being robbed of their money, as well as their tips have occurred, sometimes even causing injuries. Their website “PapaJohns.com” may be another different security issue, where it could be hacked. The group UGNazi had done this in the past where they had taken-out Papa John’s website for failure to deliver a pizza on time (Fightlinker.com).
He met Patsy in 1979 and considered her his "Jackie Kennedy." At the time, he was divorced and failing in business. A year later, he married her. A year later, her father bailed him out of the failing business. That business, too, failed but apparently Don Paugh bailed him out again. This time, the company flourished. This time, the company merged and John became part of a bigger company, not his ...
The local stores’ general manager of the next store close to Papa John’s was also robbed by what was termed as “an inside job”. Rydeen noted that people also try to steal more than money, customers’ credit card information, and steal store products and other valuable assets. Some people have been caught and prosecuted including employees; however, the fact remains that some security protocol may often be overridden, even by the employees of the company. Papa John’s control procedures
According to Businessdictionary.com, control procedures are policies established to offer reasonable assurance (Businessdictionary.com).
Papa John’s may be indomitable and predominatly, the greatest pizza company in the U.S.; hence, they have to make sure that their management control assurance is the best in reference to security. As a public company, an obligation during their fiscal year was to assess their security control system; for instance, what to be improved to avoid losing money, through the acquisition of new assets. The main roles of security personnel in Papa John’s involve the securing and protection of institutions, businesses, and their assets. This may include patrolling the property, accessing control to the facility, and ensuring the enforcement of general safety codes. Security personnel in Papa John’s also work strongly with urgent situation response teams, for instance, police officers, medical personnel and firefighters during emergencies. Whereas security personnel may not be law enforcement, most work in capacity of being armed. Security in Papa John’s, include: protecting employees, the employer’s property, and the company’s assets.
This security in Papa John’s is of two types: mobile or static, essentially that has a meaning that the security officers either monitor the exterior or interior of the facility areas through patrols in vehicles, on foot or even surveillance equipment. Since these officers may frequently be placed in situations that may be dangerous, communication equipment use may be of vital importance. Security personnel communicate clearly in written and verbally forms and these skills may be necessary for the security personnel in Papa John’s to have the ability to truthfully testify in court or succinctly express a situation. According to David Rydeen, whenever the company puts in mechanisms of control, such as security cameras to enhance security there is often a possibility to have some ethical dilemmas. As acknowledged earlier, people steal assets and money from this company and a faction of individuals has already hacked into their website.
THE RESTAURANT & FAST FOOD INDUSTRY ANALYSIS OF THE PIZZA CHAIN SECTOR THE RESTAURANT INDUSTRY AND HISTORY Where and when did the fast food concept come into play Consider the hamburger. While German immigrants brought the first "Hamburg Style Steak" to the United States in the early 19 th century, the humble hamburger, "White Castle," became the basis for a new kind of restaurant in 1916 ...
Nevertheless, The security director’s responsibility includes to hopefully lead security-intersecting functions through integration of the security applications used in Papa John’s with the rest of the organization, and doing so in techniques that advance how overall risk management. David Rydeen admits that learning new skills may be outside the comfort zones, however, it is what ought to be done, often, to keep security in business environments, while closely working with other departments. Finally, according to David Rydeen, security may be of crucial importance, and improving security measures and integrity in Papa John’s may be important in protecting its assets. They have come up with a broad spectrum of activities including, making sure that their website may never hacked once again, through having a firewall. This is basically a software program or hardware that assists in guarding their database’s private knowledge. Resources have also been allocated technologies that assist in detection and response. So that when resistance and prevention strategies fail and a security breach happen, the organization may use this detection and response technologies to moderate the damage. Lately, they have used antivirus software as a type of defense within this detection and response technologies (Baltzan & Phillips, 2009).
In conclusion, Papa John’s may be a huge organization, not only for the reason that it deals in food, but also because it owns a lot of assets in America. Security is of great importance when it comes to protecting its assets, issues of hacking and assets being stolen have been handled with the great importance by the security personnel and proper security strategies. Hence, the role played by security on protecting an organization’s assets is of fundamental importance. Moreover, Security professionals also play a vital role to lead and offer their roadmap and security to peer leaders in the other departments so as to work together in providing overall security services in the organization. The role of the security director and his/her team are crucial, no matter the location of the security headquarters (Ortmeier, 2009).
“An Information Security Policy is the cornerstone of an Information Security Program. It should reflect the organization’s objectives for security and the agreed upon management strategy for securing information”(Bayuk, 2009). Finding out how management views security is the first step in composing a security policy. The human element is the biggest security vulnerability for ...
There may be not, or likely by no means will there be, any replacement for actually interceding connecting a perpetrator and his targeted intention in a manner that may be timely. However, with new technologies in security, that role may be joined through a host of other departments, professionals from Logistics, HR, IT, Legal, and in other departments related to security may assist in the protection of the assets of an organization.
Baltzan, P. & Phillips, A. (2009).
Business Driven Information Systems, Print. Businessdictionary.com. (n.d).
Retrieved on February 06, 2013; from, http://www.businessdictionary.com/definition/control-procedure.html Cleary.edu. (2006).
Papa John’s, International. Retrieved on February 06, 2013; from, http://ftp.cleary.edu/OPM_QTY/OPM/400/M6/Capstone_Example_PapaJohns.pdf Ferrell, O.C. (2004).
“Business Ethics and Customer Stakeholders”. Academy
of Management Executive, 18, 126. Retrieved on February 06, 2013; from,
http://danielsethics.mgt.unm.edu/pdf/Customer%20Stakeholders.pdf Fightlinker.com. “Meet Cosmo, One of the Hackers That Took Down UFC.com”. (n.d) Retrieved on February 06, 2013; from, http://fightlinker.com/meet-cosmo-one-of-the hackers-that-took-down-ufc-com/
Ortmeier, J.P. (2009).
Introduction to Security Operations and Management. Custom Ed. Pearson. ISBN 0558700012.
Papa John’s, (2011).
“Code of Ethics and Business Conduct”. Retrieved on February 06, 2013; from,